[SUSE-SU-2020:3651-1] Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3)
Severity
Important
Affected Packages
20
CVEs
3
Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3)
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.
The following security issues were fixed:
- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
- ID
- SUSE-SU-2020:3651-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2020/suse-su-20203651-1/
- Published
-
2020-12-07T16:27:15
(3 years ago) - Modified
-
2020-12-07T16:27:15
(3 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2021-1461
- ALAS2-2020-1566
- ALPINE:CVE-2020-8694
- ALSA-2021:0558
- ASA-202011-10
- ASB-A-174737972
- ELSA-2020-5913
- ELSA-2020-5914
- ELSA-2020-5917
- ELSA-2020-5923
- ELSA-2020-5924
- ELSA-2020-5926
- ELSA-2020-5995
- ELSA-2020-5996
- ELSA-2021-0558
- ELSA-2021-0856
- ELSA-2021-9002
- ELSA-2021-9006
- ELSA-2021-9007
- FEDORA-2020-98ccae320c
- FEDORA-2020-e211716d08
- MS:CVE-2020-25705
- openSUSE-SU-2020:1906-1
- openSUSE-SU-2020:2034-1
- openSUSE-SU-2020:2112-1
- openSUSE-SU-2020:2161-1
- openSUSE-SU-2020:2260-1
- openSUSE-SU-2021:0242-1
- RHSA-2021:0537
- RHSA-2021:0558
- RHSA-2021:0856
- RHSA-2021:0857
- SUSE-SU-2020:3272-1
- SUSE-SU-2020:3273-1
- SUSE-SU-2020:3281-1
- SUSE-SU-2020:3326-1
- SUSE-SU-2020:3484-1
- SUSE-SU-2020:3491-1
- SUSE-SU-2020:3501-1
- SUSE-SU-2020:3503-1
- SUSE-SU-2020:3507-1
- SUSE-SU-2020:3512-1
- SUSE-SU-2020:3513-1
- SUSE-SU-2020:3522-1
- SUSE-SU-2020:3532-1
- SUSE-SU-2020:3544-1
- SUSE-SU-2020:3648-1
- SUSE-SU-2020:3670-1
- SUSE-SU-2020:3690-1
- SUSE-SU-2020:3698-1
- SUSE-SU-2020:3713-1
- SUSE-SU-2020:3715-1
- SUSE-SU-2020:3717-1
- SUSE-SU-2020:3748-1
- SUSE-SU-2020:3764-1
- SUSE-SU-2021:0437-1
- SUSE-SU-2023:4625-1
- SUSE-SU-2023:4936-1
- USN-4626-1
- USN-4627-1
- USN-4657-1
- USN-4658-1
- USN-4659-1
- USN-4679-1
- USN-4680-1
- USN-4681-1
- USN-4751-1
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3651-1.json | |
Suse | URL for SUSE-SU-2020:3651-1 | https://www.suse.com/support/update/announcement/2020/suse-su-20203651-1/ | |
Suse | E-Mail link for SUSE-SU-2020:3651-1 | https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html | |
Bugzilla | SUSE Bug 1178622 | https://bugzilla.suse.com/1178622 | |
Bugzilla | SUSE Bug 1178700 | https://bugzilla.suse.com/1178700 | |
Bugzilla | SUSE Bug 1178783 | https://bugzilla.suse.com/1178783 | |
CVE | SUSE CVE CVE-2020-25668 page | https://www.suse.com/security/cve/CVE-2020-25668/ | |
CVE | SUSE CVE CVE-2020-25705 page | https://www.suse.com/security/cve/CVE-2020-25705/ | |
CVE | SUSE CVE CVE-2020-8694 page | https://www.suse.com/security/cve/CVE-2020-8694/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_130-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_130-default | < 4-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_130-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_130-default | < 4-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_127-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_127-default | < 5-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_127-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_127-default | < 5-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_124-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_124-default | < 5-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_124-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_124-default | < 5-2.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_121-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_121-default | < 5-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_121-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_121-default | < 5-2.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_116-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_116-default | < 6-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_116-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_116-default | < 6-2.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_113-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_113-default | < 9-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_113-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_113-default | < 9-2.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_141-default?arch=x86_64&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_141-default | < 4-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_141-default?arch=ppc64le&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_141-default | < 4-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_138-default?arch=x86_64&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_138-default | < 5-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_138-default?arch=ppc64le&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_138-default | < 5-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_135-default?arch=x86_64&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_135-default | < 5-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_135-default?arch=ppc64le&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_135-default | < 5-2.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_129-default?arch=x86_64&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_129-default | < 7-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_129-default?arch=ppc64le&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_129-default | < 7-2.2 | sles-12 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |